Posts

fruad

Mitigating fraud, theft and scam risks within financial institutions

Frank Costa, President Nexgen Protection Services – 

Social engineering schemes have been such an easy way for fraudsters to get money. To guard against this fraud exposure, banks and financial institutions have to work just as hard as the fraudsters, and stay on top of any new threats that emerge. 

One of the best ways to defeat a social engineering scam requesting payment is to make a phone call to a number that is on file and ask if the person you received the request from really sent those instructions. 

Confirming with the appropriate person on file through a verbal phone call that a funds transfer request can proceed is a smart way to identify scam (fraud) attempts. With possibly hundreds of thousands or even millions of dollars at stake, it’s worth taking the extra time to confirm the validity of a funds transfer request.

SOURCE: 

Alger, J. Mitigating fraud, theft and scam risks within financial institutions, 12/2/2024.
#protectionservices #securitystandards #publicsaftey  #mobilesecurity #securitythreats

 

Security Firm Agents Identify Threats That AI Simply Cannot

Security Firm Agents Identify Threats That Artificial Intelligence (AI) Simply Cannot

Frank Costa, President Nexgen Protection Services – 

Artificial intelligence (AI) has become deeply integrated into both our personal and professional lives. From dynamic pricing to healthcare diagnostics, businesses across sectors leverage AI to improve efficiency and outcomes.

AI can efficiently sift through thousands of résumés, highlighting candidates with the right keywords for specific roles.  Human recruiters excel at evaluating soft skills, emotional intelligence, and adaptability—traits that are crucial to success in almost any role. These insights come through interviews, personal interactions, and even informal conversations that AI simply cannot replicate.

Combining AI’s strengths with human intuition, organizations can build diverse, talented teams that support long-term success.

SOURCE: 

Ruiz, V. Background Checks for Security Businesses, Security Info Watch Magazine, 11/7/2024.
#protectionservices #securitystandards #publicsaftey  #mobilesecurity #securitythreats

 

Background Checks Can Spot Red Flags On Applications

Background Checks Can Spot Red Flags On Applications

Frank Costa, President Nexgen Protection Services – 

For security integrators and consultants, background checks play an obviously vital role, as many employees are placed in a position of high trust for customers.   

During the hiring process, a company may conduct a background check to ensure that a candidate does not have a criminal background that could create a danger in the workplace or is being truthful about their employment history. 

Background checks verify a wealth of information about prospective candidates:

 

Identity: 

Background checks can help verify a person’s identity. Checking against records like social security numbers and fingerprint databases ensures that a person is actually who they say they are and has no malicious intentions.

 

Credit: 

Depending on who conducts a background check, it may include a detailed or abbreviated credit history report. Credit history is a crucial determinant of whether a lender will approve a loan to someone, while employers can check a prospective employee’s credit history to gauge how responsible they might be.

 

Criminal history: 

Background check providers will compare a person against several criminal databases on a state, national, and international level to ensure any relevant criminal charges in an applicant’s past are brought to light. Knowing this information is especially important for employers, especially for jobs in the security industry.

 

Employment, academic, and licensure verification: 

Background checks can also verify essential qualifications such as employment history, academic credentials, and licenses. Since these qualifications are often legally required for jobs, verifying them with a background check ensures that new hires meet all legal requirements.

 

SOURCE: 

Coats, K. Background Checks for Security Businesses, Security Info Watch Magazine, 11/19/2024.
#protectionservices #securitystandards #publicsaftey  #mobilesecurity #securitythreats

 

Cargo Theft is Real and You Need to Protect Your Assets

Cargo Theft is Real and You Need to Protect Your Assets

Frank Costa, President Nexgen Protection Services – 

A new form of theft has developed – strategic cargo theft. Strategic cargo theft is defined as deceiving a party at various points within the supply chain to hand over their freight to thieves. This form of theft involves the manipulation of data, paperwork, and identities from a distance to gain access to freight under false pretenses.

Use dedicated, asset-based carriers to move your freight. An asset-based carrier is a company that owns its trucks and hires its own drivers. This allows you to clearly vet the company you will be doing business with.

Insist on placing disposable GPS trackers inside your high-value loads. These cost-effective devices eliminate reverse logistics and device management while providing complete visibility of your freight, in real-time, from anywhere around the world. 

 

SOURCE: 

Tabor, J. Strategic Cargo Theft: What It Is, How It Started, and What You Can Do to Stop It, Loss Prevention Magazine, 12/2/2024.
#protectionservices #securitystandards #publicsaftey  #mobilesecurity #securitythreats

 

Artificial intelligence and Machine Learning are Game Changers

Artificial intelligence and Machine Learning are Game Changers

Frank Costa, President Nexgen Protection Services – 

Artificial intelligence (AI) and machine learning (ML) are no longer just buzzwords; they’re reshaping the very fabric of how we protect our spaces, assets, and people. These smart systems are not just observing – they’re thinking, predicting and enabling security professionals to do more with less.

AI and ML allow security departments to extend their reach and effectiveness without necessarily expanding their workforce. 

  • Automated Monitoring: AI can continuously monitor multiple video feeds from one to dozens or many hundreds of cameras, flagging only the events that require human attention.
  • Intelligent Dispatching: ML algorithms can analyze incidents, learn from the patterns, and automatically dispatch the most appropriate response.
  • Predictive Maintenance: AI can monitor the health of security equipment, predicting failures before they occur, helping reduce downtime.

These capabilities don’t just save time; they fundamentally change how security teams operate, allowing them to be more strategic and proactive in their approach.

 

SOURCE: 

Carder, H. Smart systems usher in a new era of proactive physical security, Loss Prevention Magazine, 10/22/2024.
#protectionservices #securitystandards #publicsaftey  #mobilesecurity #securitythreats

 

Manage & Analyze Data To Safeguard Operations Against Threats

Manage & Analyze Data To Safeguard Operations Against Threats

Frank Costa, President Nexgen Protection Services – 

Effective data collection and management in the aftermath of violent incidents are key for preventing future occurrences. During violent incidents, chaos and stress can lead to critical details being overlooked. A standardized approach to data collection ensures that no pertinent information is missed.

Intelligence from mobile phones, tablets, computers, and hotlines, provides detailed information such as suspect identifiers, vehicle descriptions, targeted items, and much more.

Effective data management allows for the identification of patterns and characteristics shared among violent incidents. By analyzing data on vehicle information, physical descriptions, and targeted items, organizations can identify trends and take proactive measures.

 

SOURCE: 

How Proper Data Collection Prevents Future Violence Incidents, Loss Prevention Magazine, 10/10/2024.
#protectionservices #securitystandards #publicsaftey  #mobilesecurity #securitythreats

License Plate Recognition (LPR): Secure, Intelligence Led Approach Retail Protection

License Plate Recognition (LPR): Secure, Intelligence Led Approach Retail Protection

Frank Costa, President Nexgen Protection Services – 

Retailers are increasingly focused on establishing additional layers of control – so it makes sense why License Plate Recognition (LPR) is becoming a common talking point when it comes to LP strategies.

The scope of loss prevention has expanded to human safety first and foremost. This shift is matching the rise of Organized Retail Crime and violence in stores.

LPR systems use high-resolution cameras and other systems to capture and convert images of license plates into alphanumeric text, which can then be cross-referenced. Retailers worldwide have adopted LPR (sometimes known as ANPR) increasingly as an important component of their security strategies.

 

SOURCE: 

Elevating Retail Security Integrating License Plate Recognition and

Audio Detection into Your Safety Strategy, Loss Prevention Magazine, 12/10/2023.
#protectionservices #securitystandards #publicsaftey  #mobilesecurity #securitythreats

 

Shrink From Theft Significantly Impacts Small-To Medium-Sized Retailers

Shrink From Theft Significantly Impacts Small-To Medium-Sized Retailers

Frank Costa, President Nexgen Protection Services – 

SMB retailers operate on narrow profit margins, they typically don’t have the budget or resources to invest in the training, security systems, and personnel to combat theft like larger retailers do. Offenders might also be more familiar with SMB retailers’ store layouts and know they lack specific security measures. If smaller stores with weaker security are located near larger stores with more robust protection, there might be an issue of displacement in which offenders pass by the big box shop for the mom-and-pop.

A low cost solution to theft prevention for SMB retailers is partnerships. Many law enforcement organizations have community policing units, where officers are specially trained to interact with local businesses and citizens to help them solve problems. SMB retailers can connect with this unit or a liaison and invite them to the store to dispense free crime prevention advice.

 

SOURCE: 

Fritsky, L. For Small- to Medium-Sized Business Retailers, Thwarting Theft Needn’t Come with High Effort or Costs, Loss Prevention Magazine, 10/09/2024.
#protectionservices #securitystandards #publicsaftey  #mobilesecurity #securitythreats

The Glendale Police Department Uses Tech to Expedite its 9-1-1 Response

The Glendale Police Department Uses Tech to Expedite its 9-1-1 Response

Frank Costa, President Nexgen Protection Services – 

The Glendale Arizona Police Department was alerted to a shooting by following a 9-1-1 call’s real-time transcript.  The real-time crime center (RTCC) analysts immediately pulled up the security camera at the intersection and saw the homicide suspect fleeing in the victim’s vehicle. The officer was able to react before a computer-aided dispatch (CAD) incident was entered and apprehended the suspect after a pursuit.

Motorola Solutions’ CommandCentral Aware unifies voice, video, and data feeds from public safety, private enterprise, and community-facing systems, leveraging AI to verify incident data and speed up response. Built to the highest security standards, the command center solution surfaces, on a single pane of glass in the RTCC, 9-1-1 call details, the location of resources in the field, data from license plate readers and footage from fixed video, mobile, and body cameras.

 

SOURCE: 

Arizona police department utilizes Motorola 9-1-1 intelligence to halt active shooter, Security Infowatch, 10/17/2024.
#protectionservices #securitystandards #publicsaftey  #mobilesecurity #securitythreats

 

Factors to Consider When Implementing a Physical Security System.

Factors to Consider When Implementing a Physical Security System.

Frank Costa, President Nexgen Protection Services – 

While technology like cameras, alarms, and access control systems are crucial components, they are only as effective as the people who use and manage them and the systems that deploy them. When installing physical security systems, the focus should be on the holistic operation of the system rather than the functioning of individual components. 

Tight collaboration between security and IT stakeholders delivers significant value to both security and business operations, but it’s important to clearly define and communicate goals and expectations from the start. 

 

SOURCE: 

Anderson, L. What Is The Most Overlooked Factor When Installing Physical Security?, Security Infomed, 09/10/2024.
#protectionservices #securitystandards #publicsaftey  #mobilesecurity #securitythreats